Just some lists of Malware Configs
☆173Jan 9, 2025Updated last year
Alternatives and similar repositories for MalwareConfigLists
Users that are interested in MalwareConfigLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆512Oct 7, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated last month
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automatically created C2 Feeds☆667Mar 19, 2026Updated last week
- Collection of generic YARA rules☆16Mar 18, 2026Updated last week
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- ☆45Feb 24, 2026Updated last month
- This repository contains indicators of compromise (IOCs) of our various investigations.☆316Nov 4, 2025Updated 4 months ago
- ☆96May 5, 2025Updated 10 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repo is about Active Directory Advanced Threat Hunting☆649Feb 17, 2025Updated last year
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆932Mar 7, 2026Updated 2 weeks ago
- Welcome to the SEKOIA.IO Community repository!☆180Mar 9, 2026Updated 2 weeks ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,956Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆105Jul 11, 2024Updated last year
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 3 years ago
- ☆35Jan 13, 2026Updated 2 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆760Updated this week
- ☆21Apr 19, 2024Updated last year
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆645Updated this week
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆32Mar 11, 2026Updated 2 weeks ago
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 3 months ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆76Jan 6, 2026Updated 2 months ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated 2 weeks ago
- Windows Local Privilege Escalation Cookbook☆1,287Feb 5, 2026Updated last month
- ☆23Jul 7, 2023Updated 2 years ago